Atnaujinkite slapukų nuostatas

El. knyga: Detection of Intrusions and Malware, and Vulnerability Assessment: 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24-26, 2020, Proceedings

Edited by , Edited by , Edited by , Edited by
  • Formatas: PDF+DRM
  • Serija: Security and Cryptology 12223
  • Išleidimo metai: 07-Jul-2020
  • Leidėjas: Springer Nature Switzerland AG
  • Kalba: eng
  • ISBN-13: 9783030526832
  • Formatas: PDF+DRM
  • Serija: Security and Cryptology 12223
  • Išleidimo metai: 07-Jul-2020
  • Leidėjas: Springer Nature Switzerland AG
  • Kalba: eng
  • ISBN-13: 9783030526832

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

This book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2020, held in Lisbon, Portugal, in June 2020.*





The 13 full papers presented in this volume were carefully reviewed and selected from 45 submissions. The contributions were organized in topical sections named: vulnerability discovery and analysis; attacks; web security; and detection and containment.





*The conference was held virtually due to the COVID-19 pandemic.
Vulnerability Discovery and Analysis.- Automated CPE labeling of CVE
summaries with Machine Learning.- Backstabber's Knife Collection: A Review of
Open Source Software Supply Chain Attacks.- Putting Attacks in Context: A
Building Automation Testbed for Impact Assessment from the Victims
Perspective.- Attacks.- Fast and Furious: Outrunning Windows Kernel
Notification Routines from User-Mode.- HAEPG: An Automatic Multi-hop
Exploitation Generation Framework.- Understanding Android VoIP Security: A
System-level Vulnerability Assessment.- Web Security.- Web Runner 2049:
Evaluating Third-Party Anti-bot Services.- Short Paper - Taming The Shape
Shifter: Detecting Anti-fingerprinting Browsers.- It Never Rains but It
Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites.-
On the Security of Application Installers & Online Software Repositories.-
Detection and Containment.- Distributed Heterogeneous N-Variant Execution.-
Sec2graph:Network Attack Detection based on Novelty Detection on Graph
Structured Data.- Efficient Context-Sensitive CFI Enforcement through a
Hardware Monitor.